TW200425691A - Time-to-disconnect enforcement when communicating with wireless devices that have transient network addresses - Google Patents

Time-to-disconnect enforcement when communicating with wireless devices that have transient network addresses Download PDF

Info

Publication number
TW200425691A
TW200425691A TW092130348A TW92130348A TW200425691A TW 200425691 A TW200425691 A TW 200425691A TW 092130348 A TW092130348 A TW 092130348A TW 92130348 A TW92130348 A TW 92130348A TW 200425691 A TW200425691 A TW 200425691A
Authority
TW
Taiwan
Prior art keywords
message
wireless device
computer
time
action
Prior art date
Application number
TW092130348A
Other languages
Chinese (zh)
Other versions
TWI331467B (en
Inventor
Quentin S Miller
Donald J Mcnamara
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of TW200425691A publication Critical patent/TW200425691A/en
Application granted granted Critical
Publication of TWI331467B publication Critical patent/TWI331467B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/28Timers or timing mechanisms used in protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/38Connection release triggered by timers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

A wireless device constructs a message that includes a representation of a time-to-disconnect, and then transmits the message over a carrier network to a receiving computing system. The time-to-disconnect indicates a time beyond which the receiving computing system should not send a response to the message (or any other message) using the temporary network address that was assigned to the wireless device at the time the message was transmitted. The wireless device attempts to stay connected to thereby retain that address until the time-to-disconnect expires. When the response is ready to send back, if the time-to-disconnect has not yet expired, the response is sent to the wireless device using the same network address that the wireless device had at the time the original message was sent. Otherwise, if the time-to-disconnect is exceeded, then the receiving computing system does not attempt transmission of the response using that network address.

Description

200425691 玖、發明說明: 【發明所屬之技術領域】 本發明係有關於行動通信技術,更特言之,係關於一種 用來強制執行一應中斷的機制’該應中斷的機制係用於傳送 訊息給一具有臨時性網路位址的無線裝置。 【先前技術】 計算技術已經根本改變人們工作和娛樂的方式,且對人 類的進展有巨大地貢獻。現電腦可協助無數應用,例如文字 處理、電腦模擬、高階遊戲比赛、聲音辯識等等。現計算系 統以廣泛各種不同的形式出現,包括,例如,桌上型電腦、 膝上型電腦、個人數位助理(PDAs),及甚至行動電話和裝置。 一些行動無線裝置例如個人數位助理和無線電話具有 複雜s己憶體及一般處理能力’其讓行動裝置執行許多以前由 較大的桌上型電腦所執行的任務。這些任務可甚至包括在資 料網路上必要的通信任務,甚至當使用者是行動的時候,從 而允許他們存取網際網路且執行電子郵件。 一般而言,使用兩個主要傳輸層協定含有網際網路通訊 協定(IP protocol)。 一稱為傳輸控制協定(TCP)。 IP protocol僅僅處理封包的遞送,而TCP使兩個計算系統能夠 建立一連線並可靠地交換資料。TCP保證以送出資料的相 同順序將它傳送。另一主要傳輸層協定是使用者資料訊息協 定(UDP),其不在一送出和接收的計算系統之間建立一連 線。並且,UDP提供很少的錯誤控制。因為UDP不在兩個 3 200425691 通訊 連線 網路 要改 網路 位址 置。 公共 新指 送到 線裝 回應 無線 機制 境。 【發 關於 無線 制。1 計算系統之間涉及一已建立的連線,UDP經常稱作“無 協定”。其他無連線協定包括,例如,乙太網路和網際 封包交換(IPX)。 不管使用的特定協定如何,一行動無線裝置可能經常需 變它的位址。例如,當在以Ip為基礎的無線通訊載波 上,一無線裝置可與無線網路分開,從而強制執行Ip 的一非關聯性,該IP位址是當連線時可識別該無線裝 此外,甚至當連線到通訊載波網路時,無線裝置可從一 轉換交換數據網路(PSDN)移至另一者藉以強制執行重 派一與無線裝置關聯的IP位址的動作。 於是’如果無線裝置要在無線通訊载波網路上將一訊息 接收計算系統,則當有對一訊息的回應回傳時,該對無 置之網路位址的指派也許已經作廢,從而導致無法傳遞 。還更糟的是,也許已經將舊網路位址指派給傳送另一 裝置,導致無線裝置錯誤傳遞這個回應。 於是,所想要的是在一無線環境中作為更可靠的通訊之 ’而將網路位址只臨時性指派給無線裝置的一無線環 明内容】 上述含先前技藝狀態的問題由本發明的原理克服,其係 當在一通訊載波網路上將訊息送給無線裝置時,對於一 裝置強制執行一應中斷時間(a time-to-disconnect)之機 亥機制可防止由於此無線裝置與一先前位址的非關聯性 4 200425691 而可能產生的對此訊息(或甚至其他非相關的訊息)之回應 的誤傳。 無線裝置建構一訊息,其在下文稱作為一 “回本地訊息 (inbound message)” ,因這訊息就接收計算系統而論將是回 本地的。此回本地訊息包括至少間接地表示一應中斷時間之 資料攔位》例如,此應中斷時間可能清楚地陳述或也許基 於資料攔位的内容暗示。此應中斷時間是在任何向外的訊息 不被快遞給無線裝置,此無線裝置使用關聯於應中斷時間之 。亥Em時性網路位址。此無線裝置對通訊載波網路建立一連 線’如果尚未建立一連線,則將這回本地訊息在通訊載波網 路上快遞到此接收計算系統。無線裝置保持此連線直到應 中斷時間期滿。然後,如果應中斷時間沒被延伸,無線裝 置可斷開。當斷開時,指派給無線裝置的臨時性網路位址 將作廢。 虽從通訊載波網路上的無線裝置接收這回本地訊息 時,接收計算系統由,例如讀取和解釋在回本地訊息中所包 括的k料攔位,而識別無線裝置之應中斷時間。當接收計 算系統要送回一向外的訊息(〇utb〇und则““㊁)時(例如對 回本地訊息的一回應),接收計算系統判定應中斷時間是否 已經超過,若沒超過應中斷時間,則快遞此向外的訊息到該 使用臨時指定位址之無線裝置。 如果無線裝置試圖保持連線,從而使其具有相同的臨時 性網路位址直到至少該所指定應中斷時間,以及如果這系統 仍然在所指定應中斷時間之前,則接收計算系統僅僅使用該 5 200425691 臨時性網路位址送出向外的訊息,相較於不考慮應中斷時間 而言,無線裝置很可能將收到此向外的訊息。 如果應中斷時間已經超過,此接收計算系統可等待這無 線裝置再次連線,然後送出這(些)向外的訊息。此接收計 算系統也可試圖將這(些)向外的訊息送給使用選擇另一傳 輸機制的無線裝置,該另一傳輸機制是不同於無線裝置本來 慣常送出這回本地訊息的傳輸機制。例如,如果無線農置 使用在網際網路通訊協定上的UDP送出此回本地訊息,可 使用短本文訊息服務(SMS)傳回這回應。 在後續的描述中將說明本發明的附加特點和優點,並且 部分從描述當中將顯而易見,或可由本發明的實踐來學習。 本發明的特點和優點可藉由在這些附加的申請專利範園中 這些儀器設備及結合特別指出而認識和獲得本發明的特.點 和優點。本發明的這些和其他特點將從下面的描述和附力口 的申請專利範圍當中變成更加完全明顯,或如以下所說明, 可由本發明的實踐來學習。 【實施方式】 本發明的原理涉及一無線裝置,其建構一包括一應中斷 時間之一表不法的訊息’且在一通訊載波網路上將這訊息傳 給一接收計算系統。那個訊息將被稱作“回本地”訊息,因 該訊息從接收計算系統的觀點是回本地的。應中斷時間指 示一超過時間的此接收計算系統不應該送出任何使用臨時 性網路位址之向外的訊息(例如,對回本地訊息的一回應), 6 200425691 在傳送此回本地訊息的時候,將該臨時性網路位址指派給無 線裝置。該無線裝置試圖保持連線從而保留該位址直到應 中斷時間期滿。當向外的訊息準備送回時,如果應中斷時間 尚未到,將這向外的訊息送給無線裝置,其使用在無線裝置 送出這回本地訊息的時候具有的相同網路位址。否則,如 果超過應中斷時間’則接收計算系統不企圖使用那個網路位 址之向外的訊息傳輸。而是,此接收計算系統可等待從無 線裝置的下一次連線,或可試圖送出使用另一選擇的傳輸機 制之向外的訊息。 在本發明範圍之内的實施例,包括電腦可讀取的媒體用 以攜帶或具有電腦可執行的指令或在其上所儲存的資料結 構。這樣電腦可讀取的媒體能夠由一個一般用途或特殊用途 的電腦存取之任何可用的媒體。透過例子,而不局限性, 這樣電腦可讀取的媒體能包含實體電腦可讀取的媒體例如 隨機存取記憶體(RAM)、唯讀存取記憶體(r0M)、電子式_ 可抹除可程式化唯讀記憶體(EEPROM)、唯讀光碟(CD-ROM) 或者其他的光碟儲存、磁碟儲存或其他磁儲存裝置,或任何 其他能夠以電腦可執行的指令或資料結構的形式用來播帶 或儲存這想要的程式碼裝置之其他媒體,以及能夠由一個一 般用途或特殊用途的電腦存取之任何其他媒體。 當在一網路或另一通信連線(硬體連線、無線,或硬體 連線或無線的結合之任一者)上傳送或提供資訊給一電腦, 此電腦將這連線適當地視為一電腦可讀取的媒體。因此, 適當地將任何這樣的一連線命名為一電腦可讀取的媒體。在 7 電腦可讀取的媒體範圍之内也應該包括上面所述的組合。電 腦可執行的指令包含,例如,使一般用途電腦、特殊用途電 腦,或特殊用途處理裝置以執行一某種功能或功能組的任何 指令和資料。電腦可執行的指令也許是,例如,二進制、居 中的格式例如組合語言,或甚至原始碼。 第1圖和下面的时論企圖提供一簡短的、一般描述可實 作本發明的一合適計算環境。雖然不是必要,但是在電腦 玎執行的指令之一般環境條件中將描述本發明,例如程式模 組,其由電腦系統所執行。通常,程式模組包括常式、程 式、物件、元件、資料結構,等等,其執行特定任務或實作 特定抽象資料的類型。電腦可執行的指令,其關聯於資料結 構,以及這些程式模組表示用於執行在這裡所揭露的方法動 作之程式碼裝置的例子。 關於第1圖,用於本發明原理的一合適的作業環境包括 以一電腦系統1 00的形式之一般用途電腦系統。電腦系統 1 00也許是例如已適用於執行在這裡所揭露的操作之一個 人電腦。 電腦系統100包括一使用者輸入界面170,其從一輸入 裝置接收資訊,如同,例如一鍵盤、麥克風、滑鼠、或,行 動裝置的例子,一觸控墊。一輸入裝置能與使用者輸入界 面17〇耦接以致於使資訊登錄。一輸入裝置可在這樣的一 耦接上傳送資訊以回應輸入裝置的預先程式化資料或使用 者的操控。 電腦系統1 00包括一視訊輸出界面1 50,其對外部的視 8 200425691 頻顯示裝置提供一視訊輸出信號。電腦系統1 〇〇可與一視 訊顯示裝置整合地安置或者與一視訊顯示裝置分離,例如, 舉例而言一彩色或單色電腦監視器。一視訊顯示裝置能與 視訊輸出界面150耦接以致於接收一所提供的視訊輸出信 號。在一行動裝置的例子中,這視訊輸出界面可為一相對 較小的顯示之界面。 同樣地’電腦系統100包括一音訊輸出界面13〇 ,其對 外部音訊輸出裝置提供音頻輸出信號。電腦系統丨00也可 與一音訊系統整合地安置或者與一音訊系統分離,其為可包 括能夠發出聲音資料的一擴音器或其他裝置。能夠使一音頻 系統與音訊輸出界面1 30耦接以致於接收一所提供的音訊 輸出信號。 電腦系統100包括處理單元120,其斟酌複雜和靈活的 元1 20執行所設計的電腦可執 包括本發明的特點。處理單元 其也相互連線包括系統記憶 一般用途處理能力。處理單元 行指令以實作電腦系統1 00 ,包 1 20與系統匯流排11 〇耦接,直 140的各種其他元件200425691 (1) Description of the invention: [Technical field to which the invention belongs] The present invention relates to mobile communication technology, and more specifically, to a mechanism for forcing an interruption. The interruption mechanism is used for transmitting messages. Give a wireless device with a temporary network address. [Previous Technology] Computing technology has fundamentally changed the way people work and play, and it has greatly contributed to human progress. Today's computers can assist in countless applications, such as word processing, computer simulations, high-level game competitions, sound recognition, and more. Today's computing systems come in a wide variety of different forms, including, for example, desktop computers, laptops, personal digital assistants (PDAs), and even mobile phones and devices. Some mobile wireless devices, such as personal digital assistants and wireless phones, have complex memory and general processing capabilities' which allow the mobile device to perform many tasks previously performed by larger desktop computers. These tasks may even include the necessary communication tasks on the data network, even when the user is mobile, thereby allowing them to access the Internet and perform email. Generally speaking, the two main transport layer protocols used include the Internet Protocol (IP protocol). One is called Transmission Control Protocol (TCP). The IP protocol only handles packet delivery, while TCP enables two computing systems to establish a connection and reliably exchange data. TCP guarantees that it will be transmitted in the same order as it was sent. Another major transport layer protocol is the User Data Message Protocol (UDP), which does not establish a connection between a sending and receiving computing system. And, UDP provides very little error control. Because UDP is not on the two 3 200425691 communication connection network, you need to change the network address. Public new instructions were sent to the wire line to respond to the wireless mechanism environment. [Posted on wireless. 1 Computing systems involve an established connection. UDP is often referred to as "no protocol." Other connectionless protocols include, for example, Ethernet and Internetwork Packet Exchange (IPX). Regardless of the specific protocol used, a mobile wireless device may often need to change its address. For example, when an IP-based wireless communication carrier is used, a wireless device can be separated from the wireless network to enforce a non-association of the IP. The IP address can identify the wireless device when connected. In addition, Even when connected to a communication carrier network, a wireless device can be moved from a Switched Switched Data Network (PSDN) to another to force the action of reassigning an IP address associated with the wireless device. So 'if the wireless device wants to receive a message on the wireless communication carrier network, when there is a response to a message, the assignment of the unaddressed network address may have been invalidated, resulting in failure to deliver. . To make matters worse, the old network address might have been assigned to send another device, causing the wireless device to mistransmit this response. Therefore, what is desired is a wireless environment that assigns network addresses to wireless devices only temporarily as a more reliable communication in a wireless environment.] The above-mentioned problem with the state of the art is governed by the principles of the present invention. Overcoming is that when a message is sent to a wireless device on a communication carrier network, a mechanism that enforces a time-to-disconnect for a device can prevent the wireless device from communicating with a previous bit. Addresses of non-relevance 4 200425691 and possible misrepresentations of responses to this message (or even other non-relevant messages). The wireless device constructs a message, which is hereinafter referred to as an "inbound message", because this message will be local to the receiving computing system. The local message this time includes a data block that at least indirectly represents a due time. For example, this due time may be clearly stated or may be implied based on the content of the data block. This outage time is the time during which any outbound messages are not delivered to the wireless device. This wireless device uses the time associated with the outage time. Hai Em Time Network Address. This wireless device establishes a connection to the communication carrier network 'If no connection has been established, the local message will be delivered to the receiving computing system on the communication carrier network. The wireless device maintains this connection until the due time has expired. The wireless device can then be disconnected if the response interruption time is not extended. When disconnected, the temporary network address assigned to the wireless device is invalidated. Although receiving this local message from the wireless device on the communication carrier network, the receiving computing system identifies, for example, the time interval when the wireless device should be interrupted by reading and interpreting the k-blocks included in the local message. When the receiving computing system wants to send back an outgoing message (such as "ututbund") (for example, a response to a local message), the receiving computing system determines whether the interrupted time has been exceeded, and if it has not exceeded the interrupted time , Then express this outward message to the wireless device using the temporarily assigned address. If the wireless device tries to stay connected so that it has the same temporary network address until at least the specified due time, and if the system is still before the specified due time, the receiving computing system uses only the 5 200425691 A temporary network address sends an outward message. Compared to ignoring the outage time, wireless devices are more likely to receive this outward message. If the interruption time has expired, the receiving computing system may wait for the wireless device to connect again, and then send the outgoing message (s). The receiving computing system may also attempt to send the outgoing message (s) to the wireless device using another transmission mechanism that is different from the transmission mechanism that the wireless device would normally use to send the local message back. For example, if Wireless Farm uses UDP over the Internet protocol to send this local message back, it can use the Short Text Message Service (SMS) to return the response. Additional features and advantages of the present invention will be explained in the following description, and part of them will be apparent from the description, or may be learned by the practice of the present invention. The features and advantages of the present invention can be realized and obtained the features and advantages of the present invention through these instruments and equipment in these additional patent application parks and in combination with special instructions. These and other features of the present invention will become more fully apparent from the following description and the scope of patent application of Fu Likou, or as can be learned from the practice of the present invention as explained below. [Embodiment] The principle of the present invention relates to a wireless device, which constructs a message including a failure message that should be interrupted, and transmits the message to a receiving computing system on a communication carrier network. That message will be referred to as a "back-to-local" message because the message is local from the perspective of the receiving computing system. The interruption time should indicate that a receiving computing system that has exceeded the time should not send any outbound messages using temporary network addresses (for example, a response to a local message), 6 200425691 When sending this local message , Assign the temporary network address to the wireless device. The wireless device attempts to stay connected so that the address is retained until the due time has expired. When the outgoing message is ready to be returned, if the interruption time has not yet elapsed, the outgoing message is sent to the wireless device, which uses the same network address that the wireless device had when sending the local message. Otherwise, if the due time is exceeded ', the receiving computing system does not attempt to use the outbound message transmission of that network address. Instead, the receiving computing system can wait for the next connection from the wireless device, or it can attempt to send out messages using another selected transmission mechanism. Embodiments within the scope of the present invention include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon. In this way, computer-readable media can be any available media that can be accessed by a general-purpose or special-purpose computer. By way of example and not limitation, such computer-readable media can include physical computer-readable media such as random access memory (RAM), read-only access memory (r0M), electronic_ erasable Programmable read-only memory (EEPROM), CD-ROM, or other optical disk storage, disk storage, or other magnetic storage device, or any other form of computer-executable instructions or data structures To play or store other media on which the desired code device is stored, and any other media that can be accessed by a general-purpose or special-purpose computer. When sending or providing information to a computer over a network or another communication connection (either hard-wired, wireless, or a combination of hard-wired or wireless), the computer appropriately routes the connection Think of it as a computer-readable medium. Therefore, any such connection is appropriately named a computer-readable medium. The combination described above should also be included within the scope of 7 computer-readable media. Computer-executable instructions include, for example, any instructions and information that cause a general-purpose computer, a special-purpose computer, or a special-purpose processing device to perform a certain function or group of functions. Computer-executable instructions may be, for example, binary, centered formats such as combinatorial languages, or even source code. Figure 1 and the following chronology attempt to provide a short, general description of a suitable computing environment in which the present invention may be implemented. Although not necessary, the invention will be described in the general environmental conditions of instructions executed by a computer, such as a program module, which is executed by a computer system. Generally, program modules include routines, procedures, objects, components, data structures, and so on, which perform specific tasks or implement specific types of abstract data. Computer-executable instructions associated with data structures, and these program modules represent examples of code devices for performing the method actions disclosed herein. With regard to Figure 1, a suitable operating environment for the principles of the present invention includes a general purpose computer system in the form of a computer system 100. Computer system 100 may be, for example, a personal computer that has been adapted to perform the operations disclosed herein. The computer system 100 includes a user input interface 170 that receives information from an input device, such as, for example, a keyboard, microphone, mouse, or example of a mobile device, a touch pad. An input device can be coupled to the user input interface 17 so that information is registered. An input device can send information on such a coupling in response to pre-programmed data from the input device or user manipulation. The computer system 100 includes a video output interface 150, which provides a video output signal to an external video 8 200425691 frequency display device. The computer system 100 may be integrated with or separated from a video display device, such as, for example, a color or monochrome computer monitor. A video display device can be coupled to the video output interface 150 so as to receive a provided video output signal. In the example of a mobile device, the video output interface may be a relatively small display interface. Similarly, the computer system 100 includes an audio output interface 13, which provides an audio output signal to an external audio output device. The computer system 00 may also be integrated with or separated from an audio system, which is a loudspeaker or other device that can include sound data. An audio system can be coupled to the audio output interface 130 to receive a provided audio output signal. The computer system 100 includes a processing unit 120, which considers the complexity and flexibility of the implementation of a computer designed to implement the features of the present invention. Processing units which are also interconnected include system memory and general-purpose processing capabilities. The processing unit executes instructions to implement the computer system 100, the package 1 20 is coupled to the system bus 11 0, and various other components of 140

系統 非揮發性的記憶體, 而’在電腦系統100 是不重要的。程式碼 或更多的程式模組。 統141、一或更多的 程式資料144。 9 200425691 電腦系統100也可包括大量儲存界面160,雖 話或PDAs —般沒有大量儲存裝置。大量儲存界1 夠從大量儲存裝置讀取資料和/或寫入資料到大 置,例如一磁碟或光碟。能夠使一大量儲存裝置與 界面1 60耦接以致於使能夠讀取和寫入資料。當 存裝置與大量儲存界面160耦接時,可在大量儲存 存一或更多的程式模組包括作業系統141、應用卷 其他程式模組143和程式資料144。 電腦系統1 〇〇是可連接於網路,例如一整個辦 整個企業的電腦網路、内部網路和/或網際網路。 1〇〇包括網路界面180 ,透過電腦系統1〇〇從外部 資料和/或將資料傳給外部來源。電腦系統1〇〇可 源父換資料,例如在這樣的一網路上之遠程處理丨 或資料庫。 當第1圖說明可實作本發明的原理之一計算 例子,含有合適組態的任何計算系統可實作本發明 在描述中和專利申請範圍中,將一“計算系統,,廣 任何硬體元件或些元件能夠使用軟體以執行一或 能。計算系統的例子包括桌上型電腦、膝上型電腦 位助理(PDAs)、電話,或任何具有處理能力的其他 置。 第2圖說明一網路環境2〇〇,其包括在一通訊 220上通訊的一無線裝置21〇和一接收計算系統 線裝置210也許是任何能夠在無線網路上通訊的身 然行動電 6 160 能 量儲存裝 大量儲存 一大量儲 裝置中儲 L 式 142、 公室的或 電腦系統 來源接收 與外部來 系統和/ 系統的'一 的特點。 泛定義為 更多的功 、個人數 系統或裝 載波網路 230。無 t置(是否 10 200425691 相同的無線裝置210也能夠在一連線的網路上通訊)。無線 裝置210也許是’例如’一膝上型電腦、個人數位助理(PDAs) 或一電話,且關於電腦系統丨〇〇而言其通常可如上所描述來 架構。 接收計算系統230也許是一代理計算系統,其服務許多 無線裝置連接或可連接到一通訊載波網路220。接收計算 系統230對電腦I20而言也可被架構成如上所描述。在一 般情況下,然而,因無線裝置經常是行動的,這無線裝置 2 1 0也許比接收計算系統230更小,雖然這需求不是必要。 接收計算系統230或許是另一無線裝置或另一計算系統,其 不一定關聯於或由任何特定通訊載波所管理。 置之應中斷時間,所以防止對此要求的一回應之可能誤導 由於與無線裝置之一先前位址的一非關聯性。在第2圖 網路環境200中可執行方法300。於是,經常參考第2 的網路環境200將描述第3圖的方法3〇〇。 由接收計算系統230執行方法3〇〇的 本 ,.B 的一步驟和幾個動 如在開頭“接收計算系統,,之 千丨昂J圖的左縱列所 ^由無線裝置210執行方法300的i ^ ^ 1 > “ 線梦番” 他動作如在開頭“ 衣置 之下第3圖的右縱列所表示。 無線裝置2 1 0建構一訊息,其包括 中斷時丹包括至少間接地表示一 時間(動作301)之一資料攔位。例 線裴晉0Λ 例如,參考第2圖, 2 1 〇將一回本地訊息24〇 這訊* 4 4 1 5亥接收計算系統23( %、包括至少間接地表示一應 應中斷時間之一資料攔 11 200425691 川。應t斷時間是—時間在其之後該訊息(或就那個而言任 何其他向外的訊息)的一回應不該快遞到這無線裝置,這無 線裝置使關聯於應t斷時間之制時性㈣位址。資料搁 位241可清楚地列出應中斷時間,或接收計算系統可使用— 時間或其他資料以得到應中斷時間。或者,資料攔位241也 許根本不存在(或也許是空的)的情況,冑_斷_也許是由 接收計算系統決定之-預設的應中斷時間。應中斷時間可 由’例如,接收-後續的訊息來延伸,該後續的訊息指示 一延伸之應中斷時間。 無線裝置對通訊載波網路建立一連線(動作3〇2)。無 線裝置可在建構回本地訊息的動作之前、之後或同時的任一 者建立這連線(動作3〇1)β於是,為了表示在連線的建立和 回本地訊息的建構之間缺少時間的相關性,如平行地說明動 作 301 和 302 。 一旦建構這回本地訊息,並且在建立對通訊載波網路的 一連線之後(若已經建立一連線),無線裝置在通訊载波網路 上將运回本地訊息快遞到此接收計算系統(動作3 〇3)。由第 2圖中具有數字“丨,,的箭頭242表示這快遞。可由任何 可能機制包括,例如一無連線或連線導向的協定。一般無 連線的協定可包括,例如使用者資料訊息協定(UDp)或無線 應用協定(WAP)。一連線導向的協定可包括,例如傳輸控制 協定(TCP)。儘管無連線的協定和連線導向的協定兩者對 通訊載波網路220皆需要連線,無連線的協定不需要為了完 成傳輸在無線裝置和接收計算系統之間的一分別的連線。 12 200425691 一旦快遞這訊息,無線裝置維持此連線從 快遞到接收計算系統的時候直到至少該應今 304)。 在這連線時候的期間,無線裝置將具 的一已指派的網路位址。此位址將持續直到將 通訊載波網路斷開,或者在一些其他事件的發 公共交換數據網路(PSDN)的改變。在判定為 斷時間之後(動作305),這無線裝置可對通訊 已建立的連線(動作306)。 從接收計算系統的觀點,此接收計算系統 路上從無線裝置中接收此回本地的訊息(動作 若無線裝置仍然準備接收這向外的訊息,接收 出一向外的訊息執行一功能的、結果導向 3 12)。這功能的、結果導向的步驟為了完成這 應的動作。然而,在第3圖所說明的實施例中 括對應的動作3 1 3、3 1 4和3 1 5。 更尤其是,當想要送出一向外的訊息時, 統識別一無線裝置之應中斷時間(動作313)。 料欄位24i包括這應_斷時間之一表示,則應 讀取此資料攔位241來識別。另一方面,若 包括一時間或其他資料片段,應中斷時間可使 則而從其中得到,此接收計算系統可由讀取該 據這些衍生規則而識別該應中斷時間。如果 是空的或者不提供,則此接收計算系統可判定 之預设的應中斷時間。此應中斷時間也可由收 至少將這訊息 斷時間(動作 有一臨時性質 這無線裝置與 生上,例如一 已經超過應中 載波網路中斷 在通訊載波網 3 11)。此時僅 計算系統對送 的步驟(動作 目包括任何對 ,步驟312包 此接收計算系 例如, 若資 中斷時間可由 資料攔位241 用一套衍生規 資料攔位及依 資料攔位241 要運用一預定 到一後續的訊 13 200425691 息而延伸,該延蚀 ..^ 的應中斷時間可從具有另一資料攔位之後 續的訊心直接讀取或得到。 在送出這向外ό 的訊μ之前,此接收計算系統判定是否超 過應中斷時間(動作3 ^ )。右尚未超過應中斷時間(動作314 中的(否)),則此接收古+董& 叹冲算系統將向外的訊息快遞到使用臨 時性所指定的位址之無線裝置(動作3 ! 5 ),從而完成這功能 的,〇果導向的步驟312。無線裝置會接收到這向外的訊息 (例如回本地訊息的回應)大概一段時間,但同時仍然保 持與通訊載波網路連線(動作3〇7)。例如’參考第2圖,接 收计算系統2 3 0將第二訊息2 5 〇回傳到如具有以數字“ 2,, 才示示的箭頭243表示之無線裝置21〇。 若已經超過應中斷時間(動作3丨4中的(是)),則接收計 算系統將不把向外的訊息送至無線裝置,該無線裝置使用在 送出這回本地訊息的時候所具有的臨時性被指定之位址。而 是’接收計算系統可做幾件事情之一者。 若這向外的訊息是對回本地訊息的一回應,則另一選擇 為僅放棄這向外的訊息以及移除任何有關於回本地訊息的 狀態資訊。 另一選擇若這向外的訊息是對回本地訊息的一回應要 保持相關於回本地訊息之狀態資訊’當接收計算系統從相同 的無線裝置再一次接收一通信時,然送出此向外的訊息(動 作3 1 7)。這次,然而,此通信可指示無線裝置具有另一指 定的位址。使用那指定的位址來送出此回應(動作3 1 8)。 又另一選擇,甚至在應中斷時間期滿之後,能快遞這向 14 200425691 外 計 如 傳 權 訊 式 類 到 如 訊 通 存 定 時 網 通 會 收 的訊息,使用除了慣常將這回本地訊息從無線裝置至接收 算系統通訊的傳輸以外的另一選擇傳輸(動作3丨6)。例 ,若使用UDP快遞這原始回本地訊息,則可使用sms回 此回應。 實作运些選擇中的哪個可取決於此關聯訊息的一優先 。例如,若超過應中斷時間,低優先權的一訊息可導致對 訊息完全放棄的一回應。即使已經超過應中斷時間,若一 息是較咼的優先權,可使用另一選擇通信的機制以適時方 回傳一回應。 Λ息240也許是可在無線通訊載波網路上通訊的任何 型的说息。此外,資料攔位24 1可在訊息之内任何地方找 並且資料攔位24 1是由一協定堆疊的任何層可解釋的。例 ,資料攔位也許疋一攔位預先未定的或附加於一關聯的通 協定數據單元(PDU)作為從而由協定堆疊中的網際網路 訊協定層可解釋的。或者,資料欄位24丨可在一簡易物件 取協定(SOAP)封套的標題或本文攔位之内找到以從由協 堆疊中的一應用層可解釋的。 於是’當在通訊載波網路上通訊或者使用一無線裝置 ’本發明的原理斟酌改進的效率。尤其是,當在通訊載波 路上從一無線裝置送出一回本地訊息時,即使無線裝置與 訊載波網路已經分開,減少將送出一隨後向外訊息之機 。此外’也減少可由沒送出這回本地訊息的一無線裝置接 一誤導向外的訊息之機會。 總是有一機會為這無線裝置可重新指派一位址或甚至 15 在應中斷時間期 用者正在旅行,^ 路失去這連線。 從而強制執行一 在這些例-有收到一或更多 的重新指派,且$ 功維持一連線直 者疋块導一回應 本發明的原 訊載波網路上的 求時,無線裝置Έ 連線著。另一方 置可能想要一維 約接下的五分鐘 栽波網路有多久 以及其他的環境 甚至可考慮 如,如果在尖峰a 傾向較短之應中I 者具有保留對目 分鐘量中之重要日 骏置可為了便利1 本發明可以. 滿之則可能斷開。例如,如當無線裝置的使 失線袭置可僅通過一隧道從而對通訊載波網The system is non-volatile memory, and it ’s not important in computer system 100. Code or more program modules. System 141, one or more program data 144. 9 200425691 The computer system 100 may also include a mass storage interface 160, although there are generally no mass storage devices or PDAs. Mass storage sector1 is sufficient to read data from and / or write data to mass storage devices, such as a magnetic disk or optical disc. A large number of storage devices can be coupled to the interface 160 so that data can be read and written. When the storage device is coupled to the mass storage interface 160, one or more program modules may be stored in the mass storage including the operating system 141, application volume other program modules 143, and program data 144. The computer system 100 can be connected to a network, such as a computer network, an internal network, and / or the Internet of an entire enterprise. 100 includes a network interface 180 for transmitting external data through a computer system 100 and / or transmitting data to an external source. The computer system 100 can change data from the source, such as remote processing on a network or a database. When Figure 1 illustrates a calculation example that can implement one of the principles of the present invention, any computing system containing a suitable configuration can be implemented in the present invention. In the description and the scope of the patent application, a "computing system," which can be used on any hardware The component or components can use software to perform one or more functions. Examples of computing systems include desktop computers, laptop computer assistants (PDAs), telephones, or any other device with processing capabilities. Figure 2 illustrates a network Road environment 2000, which includes a wireless device 21 communicating on a communication 220 and a receiving computing system line device 210 may be any physical mobile phone capable of communicating on a wireless network. 6 160 A large number of storage devices store L-142, office or computer system source receiving and external system and / or system's characteristics. Broadly defined as more work, personal number system or load wave network 230. No t Device (whether 10 200425691 the same wireless device 210 can also communicate on a connected network). The wireless device 210 may be 'for example' a laptop, personal digital Assistants (PDAs) or telephones, and with respect to computer systems, they can generally be structured as described above. The receiving computing system 230 may be a proxy computing system that serves many wireless device connections or can be connected to a communication carrier Network 220. The receiving computing system 230 can also be configured for the computer I20 as described above. In general, however, because wireless devices are often mobile, this wireless device 2 1 0 may be more than the receiving computing system 230 Small, although this requirement is not necessary. The receiving computing system 230 may be another wireless device or another computing system, which is not necessarily associated with or managed by any particular communication carrier. It should be interrupted in time, so prevent this requirement The response may be misleading due to a non-association with a previous address of one of the wireless devices. The method 300 may be performed in the network environment 200 of FIG. 2. Therefore, referring to the network environment 200 of FIG. Method 300. The receiving computing system 230 executes one step of Method 300, .B and several actions as in the beginning "Receiving Computing System, thousands of丨 The left column of the Ang J figure ^^^ 1 of the method 300 executed by the wireless device 210 > "Line Dream Fan", his action is as shown in the right "column of Figure 3 below the opening". Wireless Device 2 10 constructs a message, which includes a data block at least indirectly representing a time (action 301) when interrupted. Routine Pei Jin 0Λ For example, referring to Figure 2, 2 1 0 will return a local message 24〇This news * 4 4 1 5 Receiving computing system 23 (%, including at least indirectly indicating one of the data should be one of the interruption time 11 200425691 Sichuan. The response time is-time after this message (or just A response to that of any other outgoing message) should not be delivered to the wireless device, which wireless device is associated with the time-of-day address of the off-time. The data shelf 241 may clearly list the time of the interruption, or the receiving computing system may use the time or other information to obtain the time of the interruption. Alternatively, the data block 241 may not exist at all (or it may be empty), and 胄 _ 断 _ may be determined by the receiving computing system-a preset interruption time. The interruption time can be extended by, for example, a receive-subsequent message indicating an extended interruption time. The wireless device establishes a connection to the communication carrier network (action 302). The wireless device can establish this connection before, after, or at the same time as the action of constructing the local message (Act 3) β. Therefore, in order to indicate the lack of time between the establishment of the connection and the construct of the local message, Relevance, such as illustrating actions 301 and 302 in parallel. Once this local message is constructed, and after a connection to the communication carrier network is established (if a connection has been established), the wireless device sends the local message back to the receiving computing system on the communication carrier network (action 3 〇3). This courier is represented by the arrow 242 with the numbers "丨," in Figure 2. It can be included by any possible mechanism, such as a connectionless or connection-oriented protocol. A general connectionless protocol can include, for example, user data messages Protocol (UDp) or Wireless Application Protocol (WAP). A connection-oriented protocol may include, for example, Transmission Control Protocol (TCP). Although both the connectionless protocol and the connection-oriented protocol apply to the communication carrier network 220, A connection is required, and a connectionless protocol does not require a separate connection between the wireless device and the receiving computing system in order to complete the transmission. 12 200425691 Once the message is delivered, the wireless device maintains this connection from the delivery to the receiving computing system. The time should be at least 304). During this connection time, the wireless device will have an assigned network address. This address will continue until the communication carrier network is disconnected, or in some other event Send a change to the public switched data network (PSDN). After determining the disconnection time (act 305), the wireless device can establish a connection to the communication (act 306). From the perspective of the computing system, the receiving computing system receives this local message from the wireless device on the way (if the wireless device is still ready to receive this outward message, it receives an outward message to perform a function, and results-oriented 3 12) This functional, result-oriented step is intended to accomplish this action. However, the corresponding actions 3 1 3, 3 1 4 and 3 1 5 are included in the embodiment illustrated in Figure 3. More particularly, when thinking To send an outbound message, the system generally identifies the time when the wireless device should be interrupted (action 313). The material field 24i includes one of the time periods when the time should be interrupted, and the data block 241 should be read to identify. On the other hand, if a time or other piece of data is included, the interruption time can be obtained from it. The receiving computing system can identify the interruption time by reading the derived rules. If it is empty or not provided, then The receiving computing system can determine the preset interruption time. This interruption time can also be at least the message interruption time (the action has a temporary nature. If one has exceeded the interruption of the carrier network in the communication carrier network 3 11). At this time, only calculate the system's sending steps (the action includes any pair, step 312 includes the receiving calculation system. For example, if the data interruption time can be stopped by the data 241 Use a set of derivative data to block data and block it according to the data. 241 To extend from a scheduled to a follow-up message 13 200425691, the delay time of the delayed erosion .. ^ can be from a follow-up with another data block. The reading heart directly reads or obtains it. Before sending this outward message μ, the receiving computing system determines whether the interruption time should be exceeded (action 3 ^). The right has not exceeded the interruption time (action 314 (No)) ), Then the receiving ancient + Dong & sigh calculation system will deliver the outward message to the wireless device using the temporarily designated address (action 3! 5), so as to complete this function, the 0 fruit-oriented steps 312. The wireless device will receive this outgoing message (such as a response back to the local message) for some time, but at the same time it will still remain connected to the carrier network (action 307). For example, referring to FIG. 2, the receiving computing system 230 sends back the second message 250 to the wireless device 21 indicated by the arrow 243 indicated by the number "2". If it has exceeded the interruption time ( (Yes) in Action 3 丨 4, the receiving computing system will not send the outward message to the wireless device, and the wireless device uses the temporarily assigned address when sending this local message. Rather, the 'receiving computing system can do one of several things. If this outward message is a response to the local message, the other option is to just discard the outward message and remove any information about the local Status information of the message. Another option is that if this outward message is a response to the local message, the status information related to the local message should be maintained. 'When the receiving computing system receives a communication from the same wireless device again, then Send this outward message (action 3 1 7). This time, however, this communication can indicate that the wireless device has another specified address. Use that specified address to send this response (action 3 1 8). Again Another option, even after the expiry of the interruption time, can express this message. 14 200425691 Extra messages such as the right to the information received by Netcom will be used to save the local messages from the wireless device in addition to the usual The transmission to the receiving system communication is another option (action 3 丨 6). For example, if you use UDP to express the original local message, you can use sms to respond to this. The implementation of these choices may depend on Priority is associated with this message. For example, if the interruption time is exceeded, a message with a lower priority can result in a response to a complete abandonment of the message. Even if the interruption time has been exceeded, if a message has a higher priority, it can be used Another mechanism to choose communication is to return a response at the right time. Λ message 240 may be any type of message that can communicate on the wireless communication carrier network. In addition, the data block 24 1 can be found anywhere in the message and The data block 241 is interpretable by any layer of a protocol stack. For example, the data block may be a block in advance or attached to an associated association Data Units (PDUs) are interpreted by the Internet Protocol layer in the protocol stack. Alternatively, data field 24 丨 can be found within the title of a Simple Object Access Protocol (SOAP) envelope or within the text box. It can be explained from an application layer in the stack. Therefore, 'when communicating on a communication carrier network or using a wireless device', the principles of the present invention consider improved efficiency. In particular, when sending from a wireless device on a communication carrier path When returning a local message, even if the wireless device is separated from the carrier network, it will reduce the chance of sending a subsequent outgoing message. In addition, it will also reduce the number of misdirected messages that can be received by a wireless device that did not send the local message There is always a chance that the wireless device can be reassigned a location or even 15 during the time period that the user should be traveling, and the connection is lost. In order to enforce a wireless device in these cases-there is one or more reassignments received, and $ work is maintained to maintain a connection, a wireless device responds to a request on the original carrier network of the present invention. With. The other party may want to consider how long the five-minute planting wave network will be connected in one dimension and other circumstances. For example, if the spike a tends to be shorter, the one who has the retention is important in the minute amount. Sun Jun Chi may be for convenience 1 This invention can be. It may be disconnected when full. For example, when a wireless device is disabled, it can only pass through a tunnel to the communication carrier network.

Xp 一選擇或者此外,無線裝置可改變PSDNs 重新指派的位址。 ^中’方法300可有時仍然導致無線裝置沒 向外的訊息。然而,假定沒有強制執行位址 法線装置在這時期的期間對通訊载波網路成 到應中斷時間期滿,將以片狀送出一回應或 ’有一顯著減少的機會。 理也斯酌無線裝置具有對多久可連線在通 控制。例如’當送出對於更新電子郵件的要 丁'月巨要·蜚 + — 口士·一 γ · ,、有二十秒的一相當短的時間仍 面’右無線裝置是要從事即時傳訊,無線裝 持更長的通信時間,其中應中斷時間持續大 。於疋’’在判定無線裝置將繼續連線著通訊 匕可將在當地執行的網路應用程式之性質 化為因素。 對按照時間的通訊載波網路連線之費用。例 争間的期間連線這無線裝置,應中斷時間可 時間。另一方面,若無線裝置知道這使用 收費期在—平價下已經付款之—固定的 間,並且若目前收費期快要關帳,則無線 的使用者而傾向一較長之應中斷時間。 他形式實施而沒有悖離它的精神或基本 16 200425691 特性。所描述的實施例是要在各個方面視為說明性且不是限 1性。因此,由這些附加的申請專利範圍而非前述的說明來 =出本發明的範圍。所有的變更,其來自在中請專利範圍的 思義及均等範圍之内,都是在它們的範圍所涵蓋。 【圖式簡單說明】 為了描述本發明在上面所述和其他的優點和特點能夠 獲得的方式’參考在附加的圖式中所說明的特定實施例簡 要地在上面描述本發明之一更特定的描述將顯析。了解宫 些圖示僅描繪本發明的一般實施例,所以不是被視為限制: 的範圍,將透過運用此附隨的圖式來以額外的具體性和細節 描述和說明本發明,其中: p 第1圖說明一合適的作業環境作為本發明的原理; 第2圖說明本發明的原理可操作之一合適的網 境;和. & 第3圖為根據本發明的一無線裝置,說明用於強制執 一應中斷時間之一方法的一流程圖。 【元件代表符號簡單說明】 100 電 腦 系 統 110 系 統 匯 流 排 120 處 理 單 元 130 音 訊 輸 出 介面 140 系 統 記 憶體 141 作 業 系 統 142 應 用 程 式 143 程 式 模 組 144 程 式 資 料 150 視 訊 輸 出 介面 17 200425691 160 大 量 儲 存 介 面 170 使 用 者 輸入 界面 180 網 路 介 面 200 網 路 環 境 210 無 線 裝 置 220 通 訊 載 波網 路 230 接 收 計 算 系 統 240 第 一 訊 息 241 應 中 斷 時 間 250 第 二 訊 息As an alternative to XP, or in addition, the wireless device can change the reassigned address of PSDNs. The method 300 may sometimes still cause the wireless device to not send messages. However, assuming that the address normal device is not enforced during this period, the communication carrier network should reach the expiration time of the communication carrier network, and a response will be sent in the form of a chip or there will be a significant reduction of the chance. Lexicon wireless devices have control over how long the line can be connected. For example, 'When sending the main points for updating emails' Yue Ju Yao · 蜚 + — oral · a γ ·, a short period of time of twenty seconds still faced' right wireless device is to engage in instant messaging, wireless Hold longer communication times, where the interruption time should continue to be large. Yu 疋 ’’ is deciding that the wireless device will continue to be connected to the communication device, which can be a factor in the nature of network applications running locally. Charges for time-based communication carrier network connections. For example, to connect to this wireless device during a dispute, you should interrupt the time. On the other hand, if the wireless device knows that the charge period is-fixed at a parity-fixed period, and if the current charge period is about to close the account, the wireless user tends to a longer interruption time. He is formally implemented without departing from its spirit or basic 16 200425691 characteristics. The described embodiments are to be considered in all respects as illustrative and not restrictive. Therefore, the scope of the present invention is determined by these additional patent application scopes rather than the foregoing description. All the changes, which come from the scope and equality of the patent claims, are covered by their scope. [Brief description of the drawings] In order to describe the way in which the present invention described above and other advantages and features can be obtained ', one of the more specific descriptions of the present invention is briefly described above with reference to specific embodiments illustrated in the attached drawings. The description will be revealed. It is understood that these drawings depict only general embodiments of the invention and are not to be considered as limiting: the scope of this invention will be described and illustrated with additional specificity and detail by using this accompanying drawing, where: p Figure 1 illustrates a suitable operating environment as the principle of the present invention; Figure 2 illustrates a suitable network environment in which the principles of the present invention can operate; and & Figure 3 is a wireless device according to the present invention, illustrating the use of A flowchart of a method for forcing a break time. [Simple description of component representative symbols] 100 computer system 110 system bus 120 processing unit 130 audio output interface 140 system memory 141 operating system 142 application program 143 program module 144 program data 150 video output interface 17 200425691 160 mass storage interface 170 use User input interface 180 network interface 200 network environment 210 wireless device 220 communication carrier network 230 receiving computing system 240 first message 241 interruption time 250 second message

1818

Claims (1)

200425691 拾、申請專利範圍: 1. 一種在一接收計算系統中對該無線裝置強制執行一應中 斷時間(a time-to-disconnect)以防止由於一先前位址與該無 線裝置的一非關聯性而可能誤導該無線裝置未來訊息的方 法,該接收計算系統是配置於一通訊載波網路上以從一無線 裝置接收一訊息,該方法至少包含下列: 一接收動作,其係可於一通訊載波網路上的該無線裝 置接收一第一訊息,該無線裝置具有一臨時指定位址; 一識別動作,其係可識別該無線裝置之一應中斷時 間,該應中斷時間是一時間,在該時間之後即不該將一訊息 快遞給該使用臨時指定位址之無線裝置; 一判定動作,其係可判定是否已經超過該應中斷時 間;及 一快遞動作,其係僅可於當該應中斷時間尚未超過時 快遞第二訊息給該使用該臨時指定位址之無線裝置。 2. 如申請專利範圍第1項所述之方法,其中上述之將第二 訊息快遞給該無線裝置的動作至少包含下列: 一快遞動作,其係可將對第一訊息的一回應快遞給該 無線裝置,其中上述之第二訊息為該第一訊息的回應。 3. 如申請專利範圍第1項所述之方法,其中上述之將第二 訊息快遞給該無線裝置的動作至少包含下列: 一快遞動作,其係可快遞一與第一訊息不相關的訊息。 19 200425691 .如申請專利範圍第3項所述之方法,其中上述之識別該 無線裝置一應中斷時間之動作至少包含下列: 一讀取動作,其係可從一第三訊息中讀取資料,該第 三訊息是在從該無線裝置接收到該第一訊息之後再從該無 線裝置所接收的一訊息;及 一衍生動作,其係可從該讀取資料的攔位中衍生出該 應中斷時間。 5·如申請專利範圍第4項所述之方法,其中上述之從一第 二訊息衍生出之應中斷時間是晚於任何先前關聯於該無線 裝置之其他應中斷時間。 6.如申請專利範圍帛1項所述之方法,其中上述從該通訊 載波網路上的該無線裝置接mi、的動作至少包含 下列: 接收動作’其係使用—無連線通訊協定而從該無線 装置接收一訊息。 7·如申請專:】範圍“項所述之方法,其中上述使用一無 '"通協疋而從該無線裝置接收一訊息的動作至少包含 下列: 接收動作,其係運用使用者資料訊息協定(UDP)而 從該無線裝置接收一訊息。 20 200425691 8. 如申請專利範圍第6項所述之方法,其中上述使用一無 連線通訊協定從該無線裝置接收一訊息的動作至少包含下 列: 一接收動作,其係運用無線應用協定(WAP)而從該無 線裝置接收一訊息。 9. 如申請專利範圍帛!項所述之方法,其中上述從通訊載 波網路上的該無線裝置接收一第一訊息的動作至少包含下 列: 一接收動作,其係使用傳輸控制協定(TCP)而從該無線 裝置接收一訊息。 I 〇.如申請專利範圍第1項所述之方法,其中上述識別該訊 息之一應中斷時間的動作至少包含下列: 一讀取動作,其係可從該第一訊息讀取一時間;及 一何生動作,其係從該讀取的時間中衍生出該應中斷 時間。 II ·如申請專利範圍第1項所述之方法,其中上述識別一該 訊息之一應中斷時間的動作至少包含下列: 讀取動作,其係可從該第一訊息讀取該應中斷時間。 1 2’如申請專利範圍第1項所述之方法,其中上述識別該訊 息之一應中斷時間的動作至少包含下列: 2 1 200425691 一讀取動作,其係從該第一訊息讀取一資料欄位;及 一衍生動作,其係從該讀取的資料攔位中衍生出該應 中斷時間。 1 3.如申請專利範圍第1項所述之方法,其中上述識別該訊 息之一應中斷時間的動作至少包含下列: 一判定動作,其係判定一預設之應中斷時間應被應用 於該第二訊息;及 一應用動作,其係應用該預設之應中斷時間作為該應 中斷時間。 14.如申請專利範圍第1項所述之方法,其中上述之若應中 斷時間尚未超過,則將第二訊息快遞給使用該臨時指定位址 之無線裝置的動作至少包含下列: 一判定動作,其係判定該應中斷時間尚未超過;及 一快遞動作,其係在該已判定之應中斷時間尚未超過 之後,使用該臨時指定位址來快遞第二訊息。 1 5.如申請專利範圍第1項所述之方法,其中上述之判定動 作至少包含判定已經超過該應中斷時間之動作,該方法更包 含下列: 一接收動作,其係從該無線裝置接收一指示該無線裝 置具有另一指定位址的通訊;及 一快遞動作,其係使用其他指定的位址來快遞第二訊 22 200425691 息。 ’其中上述之判定動 之動作,該方法更包 16·如申請專利範圍第1項所述之方法 作至少包含判定已經超過該應中斷時間 含下列· 一快遞動作,其係使詩了慣“來自無線裝置通訊 該第-訊息至該接收計算系統以外的另一傳輸來快遞該第 二訊息。 17· —種使用在一通訊載波網路上組態以從一無線裝置接 收-訊息的-接收計算系統中之電腦程式產品,該電腦程式 產品是用於實作一對該無線裝置強制執行一應中斷時間之 方法,該方法可防止由於一先前位址與該無線裝置的一非關 聯性而對線t置之Α來訊息的τ能誤傳,言亥電腦程式產 品至少包含一或更多電腦可讀取的媒體,其上具有下列: 電腦可執行的摘測指令,其係用以在一通訊載波網路 上之該無線裝置中偵測一第一訊息的接收,該無線裝置具有 一臨時指定位址; 電腦可執行的識別指令,其係用以識別該無線裝置之 一應中斷時間,該應中斷時間是一時間,在該時間之後即不 該將一訊息快遞給使用該臨時指定位址之無線裝置; 電腦可執行的判定指令,其係用於判定是否已經超過 該應中斷時間;及 電腦可執行的快遞指令,其係僅於該應中斷時間尚未 23 200425691 時指定位址之無線裝 超過時,快遞一第二訊息給使用該臨 置。 18.如申請專利範圍帛17項所述之電觸程式產品盆中上 述用於快遞一第二訊息給使用該臨時指定位址之無線 的電腦可執行的指令至少包含下列·· 電腦可執行的回應指令,其係用於快遞該第1自的 回應給該無線裝置之,其中上述之第二訊息為對該第一:自 的回應。 如申睛專利範圍第17項所述之電腦程式產品其中上 述用於快遞一第二訊息給使用該臨時指定位址 線 之電腦可執行的指令至少包含下列: …線裝置 電腦可執行的快遞指令,其係用於快遞一與第一訊幸 不相關的訊息。 〜 20.如申請專利範圍帛i 9項所述之電腦程式產品,其中上 述用以4別該無線裝置之—應中斷時間的電腦可執行的指 令至少包含下列: . 電恥可執行的讀取指令,其係用於從一第三訊息讀取 資料該第:訊息係在該無線裝置接收該第—訊息之後而自 該無線裝置中所接收的一訊息;及 電腦可執行的衍生指令,其係用於從該讀取資料的攔 位中衍生出該應中斷時間。 24 200425691 2 1.如申請專利範圍第20項所述之電腦程式產品,其中上 述從一第二訊息衍生出之該應中斷時間係晚於任何先前關 聯於該無線裝置之其他應中斷時間。 22·如申請專利範圍第1 7項所述之電腦程式產品,其中上 述用以自該通訊載波網路上之該無線裝置偵測一第一訊息 的接收之電細可執行的指令至少包含下列: 電腦可執行的偵測指令,其係用於使用一無連線通訊 協定而從该無線裝置中偵測一訊息的接收。 23 ·如申請專利範圍第22項所述之電腦程式產品,其中上 述用於從使用一無連線通訊協定的該無線裝置中偵測一第 一訊息的接收之電腦可執行的指令至少包含下列: 電腦可執行的偵測指令,其係用於運用使用者資料訊 息協定(UDP)而從該無線裝置中偵測一訊息的接收。 24. 如申請專利範圍第22項所述之電腦程式產品,其中上 述用於從使用一無連線通訊協定的該無線裝置中偵測一第 一訊息的接收之電腦可執行的指令至少包含下列: 電腦可執行的偵測指令,其係用於運用無線應用協定 (WAP)而從該無線裝置中偵測一訊息的接收。 25. 如申請專利範圍第1 7項所述之電腦程式產品,其中上 述用以從該通訊載波網路之該無線裝置偵測一第一訊息之 25 200425691 接收的電腦可執行的指令炱少包含下列: 電腦可執行的偵測指令,其係用於運用傳輸控制協定 (TCP)而從該無線裝置中偵測一訊息的接收。 26.如申請專利範圍第17項所述之電腦程式產品,其中 上述用於自該訊息識別一應中斷時間的電腦可執行的指令 至少包含下列事項: 電腦可執行的讀取指令,其係用於該第一訊息中讀取 一時間;及 電腦可執行的衍生指令,其係用於從該讀取的時間中 衍生出該應中斷時間。 2 7 ·如申請專利範圍第1 7項所述之電腦程式產品,其中 上述用於識別該無線裝置之一應中斷時間的電腦可執行的 指令至少包含下列: 電腦可執行的讀取指令,其係從該第一訊息讀取該應 中斷時間。 28·如申請專利範圍第17項所述之電腦程式產品,其中 上述用於識別該無線裝置之一應中斷時間之電腦可執行的 指令至少包含下列事項: 電腦可執行的讀取指令,其係用於從該第一訊息中讀 取一資料攔位;及 電腦可執行的衍生指令,其用於從該讀取的資料攔位 26 200425691 中衍生出該應中斷時間。 29. 如申請專利範圍第17項所述之電腦程式產品,其中上 述用以識別該無線裝置之一應中斷時間的電腦可執行的指 令至少包含下列: 電腦可執行的判定指令,其係用於判定一應用於該無 線裝置的預設的應中斷時間;及 電腦可執行的應用指令,其係用於應用該預設的應中 斷時間作為該應中斷時間。 30. 如申請專利範圍第1 7項所述之電腦程式產品,其中 上述之用於僅若應中斷時間尚未超過而快遞一第二訊息給 無線裝置的電腦可執行的指令至少包含下列: 電腦可執行的判定指令,其係用於判定該應中斷時間 尚未超過;及 電腦可執行的快遞指令,其係用於在該判定應中斷時 間尚未超過的動作被執行之後才快遞該第二訊息。 3 1.如申請專利範圍第3 0項所述之電腦程式產品,其中 上述之電腦可執行的判定指令至少包含判定該應中斷時間 已被執行過的電腦可執行的指令,該一或多個電腦可讀取媒 體在其上更具有下列: 電腦可執行的偵測指令,其係用於從該無線裝置中偵 測一指示該無線裝置具有另一指定位址之通訊的接收;及 27 200425691 電腦可執行的快遞指令,其係用於快遞該第二訊息至 使用其他指定位址的該無線裝置。 32.如申請專利範圍第30項所述之電腦程式產品,其中 上述之電腦可執行的判定指令至少包含判定該應中斷時間 已被執行過的電腦可執行的指令,該一或多個電腦可讀取媒 體在其上更具有下列: 電腦可執行的快遞指令,其係使用除了慣常用來自無 線裝置通訊該第一訊息至該接收計算系統以外的另一傳輸 來快遞該第二訊息。 3 3 .如申請專利範圍第1 7項所述之電腦程式產品,其中上 述之一或更多電腦可讀取的媒體為實體媒體。 3 4.如申請專利範圍第33項所述之電腦程式產品,其中上 述之實體媒體為系統記憶體。 3 5.如申請專利範圍第3 3項所述之電腦程式產品,其中上 述之實體媒體為一持久性記憶體。 3 6. —種在一通訊載波網路上組態以從一無線裝置接收一 訊息的一接收計算系統中對該無線裝置強制執行一應中斷 時間以防止由於一先前位址與該無線裝置的一非關聯性而 對該無線裝置之未來訊息的可能誤傳之方法,該方法至少包 28 200425691 一接收動作,其係可從一通訊載波網路上之該無線裝 置接收一第一訊息;及 送出一第二訊息的步雜’其係僅於當該無線裝置仍 準備接收該第二訊息時且該回應仍要被快遞時才會被執行。 37.如申請專利範圍第36項所述之方法,其中上述之僅於 當該無線裝置仍準備接收該第二訊息時且該回應仍要被快 遞時才會被執行之該送出一第二訊息的步驟至少包含下列: 一識別動作,其係可識別該無線裝置之一應中斷時 間,該應中斷時間係為一時間,在該時間之後即不會將上述 第二訊息快遞給使用一臨時指定位址之該無線裝置,該臨時 指定位址係在該無線裝置傳送該第一訊息之時指派給也 線裝置; 、σ μ無 一判足動作,其係判定是否已經超過該應中斷時間· 一快遞動作,其係僅於該應中斷時間尚未超過時 遞該第二訊息給使用該臨時指定位址之無線裝置。、 3 8 · —種在組態以於一 一通訊载波網路上送出一訊息200425691 Patent application scope: 1. A time-to-disconnect forcing a wireless device to perform a time-to-disconnect in a receiving computing system to prevent a non-association between a previous address and the wireless device A method that may mislead future messages of the wireless device. The receiving computing system is configured on a communication carrier network to receive a message from a wireless device. The method includes at least the following: A receiving action, which can be performed on a communication carrier network. The wireless device on the road receives a first message, the wireless device has a temporary designated address; an identifying action, which can identify one of the wireless devices should be interrupted time, which should be a time, after that time That is, a message should not be delivered to the wireless device using the temporarily assigned address; a determination action can be made to determine whether the time that should be interrupted has been exceeded; and a delivery action can be performed only when the time that should be interrupted has not yet A second message is sent to the wireless device using the temporary designated address when the time is exceeded. 2. The method according to item 1 of the scope of patent application, wherein the above-mentioned action of expressing the second message to the wireless device includes at least the following: A express action, which can express a response to the first message to the wireless device. The wireless device, wherein the second message is a response to the first message. 3. The method according to item 1 of the scope of patent application, wherein the above-mentioned action of expressing the second message to the wireless device includes at least the following: A express action, which can express a message that is not related to the first message. 19 200425691. The method as described in item 3 of the scope of patent application, wherein the above-mentioned action of identifying a wireless device's interruption time includes at least the following: a reading action, which can read data from a third message, The third message is a message received from the wireless device after receiving the first message from the wireless device; and a derivative action, which is to derive the interruption from the block of the read data time. 5. The method as described in item 4 of the scope of patent application, wherein the above-mentioned interruption time derived from a second message is later than any other interruption time previously associated with the wireless device. 6. The method according to item 1 of the scope of patent application, wherein the above-mentioned action of receiving the mi from the wireless device on the communication carrier network includes at least the following: the receiving action 'which is using a connectionless communication protocol from the The wireless device receives a message. 7 · If applying for the method described in [Scope], in which the above-mentioned action of receiving a message from the wireless device using "Nothing" includes at least the following: a receiving action, which uses a user data message Protocol (UDP) to receive a message from the wireless device. 20 200425691 8. The method as described in item 6 of the scope of patent application, wherein the above action of receiving a message from the wireless device using a connectionless communication protocol includes at least the following : A receiving action, which uses a wireless application protocol (WAP) to receive a message from the wireless device. 9. The method described in the scope of patent application 帛! Item, wherein the above receives a message from the wireless device on a communication carrier network. The action of the first message includes at least the following: A receiving action is to receive a message from the wireless device using a Transmission Control Protocol (TCP). I. The method according to item 1 of the scope of patent application, wherein the above identifies the One of the actions that should interrupt the time includes at least the following: a read action that reads a time from the first message; and The action is derived from the read time. The time of interruption should be derived. II. The method described in item 1 of the scope of the patent application, wherein the above action of identifying a message should be interrupted at least includes the following: read Take action, which can read the interruption time from the first message. 1 2 'The method as described in item 1 of the scope of the patent application, wherein the above-mentioned action of identifying one of the message interruption times includes at least the following: 2 1 200425691 A reading action, which reads a data field from the first message; and a derivative action, which derives the interruption time from the read data block. 1 3. If a patent is applied for The method according to item 1 of the scope, wherein the above-mentioned action of identifying one of the messages should be interrupted at least includes the following: a judgment action, which determines that a preset interrupted time should be applied to the second message; and The application action is to apply the preset interruption time as the interruption time. 14. The method described in item 1 of the scope of patent application, wherein the above-mentioned interruption time has not been exceeded, The action of expressly delivering the second message to the wireless device using the temporarily designated address includes at least the following: a judgment action, which judges that the due time should not be exceeded; and a express action, which is during the judged time that should be interrupted After it has not been exceeded, use the temporary designated address to courier the second message. 1 5. The method described in item 1 of the scope of patent application, wherein the above-mentioned determination action includes at least an action that determines that the due interruption time has been exceeded, the method It also includes the following: a receiving action that receives a communication from the wireless device indicating that the wireless device has another designated address; and a courier action that uses other specified addresses to express the second news 22 200425691 information . 'Among the above-mentioned actions to determine the movement, this method is more inclusive. 16. The method described in item 1 of the scope of patent application at least includes determining that the interruption time has been exceeded, including the following · A courier action, which makes poetry used to " Receiving the second message from the wireless device by communicating the first message to another transmission outside the receiving computing system. 17 ·-A receiving-messaging calculation using a communication carrier network configured to receive-message from a wireless device A computer program product in the system. The computer program product is a method for implementing a pair of wireless devices to enforce an interruption time. The method can prevent a pair of wireless devices from being disconnected due to a non-association between a previous address and the wireless device. The τ of the message from the line t can be mistransmitted. Yanhai computer program products contain at least one or more computer-readable media, which have the following: Computer-executable test instructions, which are used to The wireless device on the communication carrier network detects the reception of a first message, and the wireless device has a temporary designated address; a computer-executable identification instruction for identifying One of the wireless devices should be interrupted. The interrupted time is a time after which a message should not be delivered to a wireless device using the temporarily assigned address. A computer-executable decision instruction is used. When determining whether the due time has been exceeded; and the computer-executable express order, which is only when the wireless installation of the specified address is not completed when the due time is not 23 200425691, a second message is sent to the temporary use. 18. As described in the scope of the patent application 帛 17, the above instructions for express delivery of a second message to a wireless computer using the temporarily designated address in the electric touch program product basin include at least the following: The response instruction is used to express the response of the first self to the wireless device, wherein the second message is a response to the first: self. The computer program product described in item 17 of Shenyan's patent scope The above instructions for express delivery of a second message to a computer using the temporary designated address line include at least the following: Express instructions, which are used to express a message that is not related to the first newsletter. ~ 20. The computer program product described in item 9 of the scope of patent application, where the above is used to distinguish the wireless device-should be interrupted The computer-executable instructions of the time include at least the following: Electrically-executable read instructions, which are used to read data from a third message. The message: The message is sent after the wireless device receives the first message. A message received in the wireless device; and a computer-executable derivative instruction for deriving the interruption time from the block of the read data. 24 200425691 2 1. According to item 20 of the scope of patent application In the computer program product, the interruption time derived from a second message is later than any other interruption time previously associated with the wireless device. 22. The computer program product described in item 17 of the scope of patent application, wherein the above-mentioned executable instructions for detecting the reception of a first message from the wireless device on the communication carrier network include at least the following: The computer-executable detection command is used to detect the reception of a message from the wireless device using a connectionless communication protocol. 23. The computer program product according to item 22 of the scope of patent application, wherein the computer-executable instructions for detecting the reception of a first message from the wireless device using a connectionless communication protocol include at least the following : A computer-executable detection command, which is used to detect the reception of a message from the wireless device using the User Data Message Protocol (UDP). 24. The computer program product described in claim 22, wherein the computer-executable instructions for detecting the reception of a first message from the wireless device using a connectionless communication protocol include at least the following : A computer-executable detection command for detecting the reception of a message from the wireless device using the Wireless Application Protocol (WAP). 25. The computer program product described in item 17 of the scope of patent application, wherein the computer-executable instructions received by the above-mentioned 25 200425691 for detecting a first message from the wireless device of the communication carrier network do not include The following: A computer-executable detection command for detecting the reception of a message from the wireless device using Transmission Control Protocol (TCP). 26. The computer program product according to item 17 of the scope of patent application, wherein the computer-executable instructions for identifying a time of interruption from the message include at least the following items: computer-executable read instructions, which are Read a time in the first message; and a computer-executable derivative instruction for deriving the interruption time from the read time. 2 7 · The computer program product described in item 17 of the scope of patent application, wherein the computer-executable instructions for identifying the interruption time of one of the wireless devices include at least the following: computer-executable read instructions, which The interruption time is read from the first message. 28. The computer program product described in item 17 of the scope of patent application, wherein the computer-executable instructions used to identify one of the wireless devices should be interrupted at least include the following: computer-executable read instructions, which are For reading a data block from the first message; and a computer-executable derivative instruction for deriving the interruption time from the read data block 26 200425691. 29. The computer program product as described in item 17 of the scope of patent application, wherein the computer-executable instructions for identifying the time when one of the wireless devices should be interrupted include at least the following: computer-executable judgment instructions, which are used for Determining a preset interruption time to be applied to the wireless device; and a computer-executable application instruction for applying the preset interruption time as the interruption time. 30. The computer program product described in item 17 of the scope of patent application, wherein the above-mentioned instructions for the computer executable only for expressing a second message to the wireless device if the interruption time has not been exceeded include at least the following: The executed judgment instruction is used to judge that the due time should not be exceeded; and the computer-executable express instruction is used to courier the second message after the action that determines that the due time has not been exceeded is executed. 3 1. The computer program product described in item 30 of the scope of patent application, wherein the computer-executable determination instructions at least include computer-executable instructions that determine that the interruption time has been executed, the one or more The computer-readable medium further has the following: a computer-executable detection instruction for detecting the reception of a communication from the wireless device indicating that the wireless device has another designated address; and 27 200425691 The computer-executable courier instruction is used to courier the second message to the wireless device using another designated address. 32. The computer program product according to item 30 of the scope of patent application, wherein the computer-executable determination instruction at least includes a computer-executable instruction that determines that the interruption time has been executed, and the one or more computers may The read medium further has the following: A computer-executable express instruction that expresses the second message using another transmission than the one commonly used to communicate the first message from the wireless device to the receiving computing system. 33. The computer program product described in item 17 of the scope of patent application, wherein one or more of the computer-readable media are physical media. 3 4. The computer program product described in item 33 of the scope of patent application, wherein the above-mentioned physical media is system memory. 3 5. The computer program product described in item 33 of the scope of patent application, wherein the above-mentioned physical medium is a persistent memory. 3 6. —A receiving computing system configured on a communications carrier network to receive a message from a wireless device enforces an interruption time on the wireless device to prevent a previous address from being associated with a wireless device. Non-associative method for possible miscommunication of future messages of the wireless device, the method includes at least 28 200425691 a receiving action, which can receive a first message from the wireless device on a communication carrier network; and send a The step of the second message is performed only when the wireless device is still ready to receive the second message and the response is still to be delivered. 37. The method according to item 36 of the scope of patent application, wherein the sending of a second message is performed only when the wireless device is still ready to receive the second message and the response is still to be courier. The steps include at least the following: An identifying action, which can identify one of the wireless devices should be interrupted time, which should be a time, after which the second message will not be courier to use a temporary designation The wireless device at the address, the temporary designated address is assigned to the line device when the wireless device transmits the first message; and σ μ has no judgment action, and it is to determine whether the interruption time has been exceeded. A courier operation is to deliver the second message to the wireless device using the temporary designated address only when the due interruption time has not been exceeded. , 3 8 · — a kind of configuration to send a message on a communication carrier network 應中 而對該無線裝置之未來訊息的可能誤傳 包含下列: 關聯性 法至少 29 200425691 …:建構動作,其係可建構-内含… 應斷時間之胃_㈣H 在該時間之後T i Z應中斷任 曼P不會將該訊息的一 指定位址之無線裝置; 〇應决遞 路;$立連線動作,其係可建立一連線至 ⑼遞動作,其係可在該通訊载波網路 遞給該接收計算系統; 、—維持連線動作,其係可維持連線至少 遞給忒接收計算系統之時直到至少該應中斷日; “J疋動作,其係可判定該應中斷時間 ^ 中斷連線動作,其係在維持該連線動 娜疋否收到一回應,在判定該應中斷時間已經 斷該已建立的連線。 39·如申請專利範圍第38項所述之方法,其 ”亥已建立的連線之動作也係在該判定應中斷 長之動作之後執行。 4〇·如申請專利範圍第38項所述之方法,其 通訊載波網路上將該訊息快遞給該接收計算 少包含下列: 一快遞動作,其係使用一無連線通訊協 快遞給接收計算系統。 可間接表示一 F間是一時間, 給使用該臨時 該通訊载波網 上將該訊息快 從將該訊息快 L間之時; 已經超過;及 作的期間,無 超過之後,中 中上述之中斷 I寺間尚未被延 中上述之在該 秦統的動作至 定而將該訊息 30 200425691 4 1 .如申請專利範圍第40項所述之方法,其中上述之使用 一無連線通訊協定將該訊息快遞給該接收計算系統的動作 至少包含下列: 一快遞動作,其係運用使用者資料訊息協定(UDP)而 將該訊息快遞給接收計算系統。 42.如申請專利範圍第40項所述之方法,其中上述之使用 一無連線通訊協定將該訊息快遞給該接收計算系統的動作 至少包含下列: 一快遞動作,其係運用無線應用協定(WAP)而將該訊 息快遞給接收計算系統。 43 ·如申請專利範圍第3 8項所述之方法,其中上述之在該 通訊載波網路上將該訊息快遞給該接收計算系統的動作至 少包含下列: 一快遞動作,其係使用傳輸控制協定(TCP)而將該訊息 快遞給接收計算系統。 44.如申請專利範圍第3 8項所述之方法,其中上述之建構 一包括一至少可間接表示一應中斷時間之資料欄位的訊息 的動作至少包含下列: 一建構動作,其係可建構一訊息,該訊息包括該應中 斷時間。 3 1 200425691 45. 如申請專利範圍第38項所述之方法,其中上述之建構 一包括一至少可間接表示一應中斷時間之資料攔位的訊息 的動作至少包含下列: 一建構動作,其係可建構一訊息,該訊息包括可從中 衍生出該應中斷時間之一時間。 46. 如申請專利範圍第3 8項所述之方法,其中上述之建構 一包括一至少可間接表示一應中斷時間之資料攔位的訊息 的動作至少包含下列: 一建構動作,其係可建構一訊息,該訊息包括可從中 衍生出該應中斷時間之一資料欄位。 4 7.如申請專利範圍第38項所述之方法,更包含下列: 一接收動作,其係可在維持該連線的期間接收對該訊 息之一回應。 4 8. —種可應用在一無線裝置之電腦程式產品,該無線裝置 係被組態以於一通訊載波網路上將一訊息送至一接收計算 系統,該電腦程式產品係用於實作一對該無線裝置強制執行 一應中斷時間以防止由於一先前位址與該無線裝置的一非 關聯性而對該無線裝置之未來訊息的可能誤傳之方法,該電 腦程式產品至少包含一或更多電腦可讀取的媒體,其上具有 下列: 電腦可執行的建構指令,其係用於建構一訊息的指 32 200425691 7 ι訊α匕括i少可間接表示一應中斷時間之資料攔 位,該應中斷時間是一時間,在該時間之後即不會將該訊息 的一回應快遞給使用一臨時指宕你u * a 吟知疋位址之無線裝置,該臨時指 定位址是指派給該無線裝置; 電腦可執行的建立指令,苴抵 ^具係用於建立連線至該通訊 載波網路; 電腦可執行的快遞指令,装伤田认、> 具係用於在該通訊載波網路 上快遞該訊息給該接收計算系統; 電腦可執行的維持連蝮指入 甘# 才硬跟知令,其係可維持連線至少從 將該訊息快遞給該接收計篡条祕 士 妖认4异糸統之時直到至少該應中斷時 間之時; 電腦可執行的判定指令,其係可判定該應中斷時間已 經超過;及 電腦可執行的中斷連線指令,其係可在維持該連線動 作的期間,無論是否收到一回應,在判定應中斷時間已經超 過之後,中斷該已建立的連線。 49·如申請專利範圍第48項所述之電腦程式產品,其中上 述用於解除該已建立連線的電腦可執行的指令也係在該判 定應中斷時間尚未被延伸之動作之後才被執行。 50.如申請專利範圍第48項所述之電腦程式產品,其中上 述用於在該通訊載波網路上快遞該訊息給該接收計算系統 之電腦可執行的指令至少包含下列: 33 200425691 電腦可執行的快遞指令,其係使用一無連線通訊協定而 快遞該訊息給該接收計算系統。 5 1.如申請專利範圍第48項所述之電腦程式產品,其中上 述使用一無連線通訊協定而快遞該訊息給該接收計算系統 之電腦可執行的指令至少包含下列: 電腦可執行的快遞指令,其係運用使用者資料訊息協 定(UDP)而快遞該訊息給該接收計算系統。 52.如申請專利範圍第48項所述之電腦程式產品,其中上 述使用一無連線通訊協定而快遞該訊息給該接收計算系統 之電腦可執行的指令至少包含下列: 電腦可執行的快遞指令,其係運用無線應用協定(WAP) 而快遞該訊息給該接收計算系統。 5 3.如申請專利範圍第4 8項所述之電腦程式產品,其中上 述用於在該通訊載波網路上快遞該訊息給該接收計算系統 之電腦可執行的指令至少包含下列: 電腦可執行的快遞指令,其係使用傳輸控制協定(TCp) 而快遞該訊息給該接收計算系統。 54.如申請專利範圍第48項所述之電腦程式產品,其中上 述用於建構一包括一至少可間接表示一應中斷時間之資料 攔位之訊息的電腦可執行的指令,其至少包含下列: 200425691 電腦可執行的建構指令,其係用於建構一訊息,該訊 息包括該應中斷時間。 55·如中請專利範圍第48項所述之電腦程式產品,其中上 述用於建才冓&括一至少可間接表示一應中斷時間之資料 欄位之訊息的電腦可執行的指令,其至少包含下列: 電腦可執行的建構指令,其係用於建構一訊息,該訊 息包括可從中衍生出該應中斷時間之一時間。 56·如中4專利範圍第48項所述之電腦程式產品,其中上 述用於建構-包括一至少可間接表示一應中斷時間之資料 攔位之訊息的電腦可執行的指令其至少包含下列: 電腦可執行的建構指令,其係用於建構-訊息,該訊 息包括可從中衍生出該應中斷時間之一資料搁位。 、,7·如申凊專利範圍第48項所述之電腦程式產品,其中上 述之一或更多電腦可讀取的媒體在其上更具有下列·· 電腦可執行的㈣指令,其係用於在該維持連線的期 ’對該訊息之一回應的接收。 迷之如中晴專利範圍第48項所述之電腦程式產品,其中上 ' 或更多電腦可讀取的媒體為實體媒體。 如申请專利範圍第58項所述之電腦程式產品,其中上 35 59 200425691 述之實體媒體為系統記憶體。 60.如申請專利範圍第58項所述之電腦程式產品,其中上 述之實體媒體為一持久性記憶體。 61. —種在其上具有表示一訊息之資料結構的電腦可讀取 的媒體,該資料結構至少包含下列事項: 一内容欄位,其係可識別該訊息的内容;Possible misinformation about the future information of the wireless device in response includes the following: Relevance method at least 29 200425691…: Constructive action, which is constructive-contained ... The stomach of the off-time _㈣H After this time T i Z The wireless device that Renman P should not interrupt the specified address of the message should be discontinued. 〇 The delivery route should be determined. The connection action should be established, which can establish a connection to the forwarding action, which can be performed on the communication carrier. The network handed over to the receiving computing system; --- Maintain the connection action, which can maintain the connection at least to the receiving computing system until at least the due interruption date; "J 疋 action, it can determine that the should be interrupted The time ^ disconnection action is to maintain whether the connection has received a response and determine whether the established connection has been disconnected at the time that the connection should be interrupted. 39. As described in item 38 of the scope of patent application Method, the action of the connection it has established is also executed after the judgement that the long action should be interrupted. 40. The method as described in item 38 of the scope of patent application, expressing the message to the receiving computer on the communication carrier network includes the following: a courier operation, which uses a connectionless communication protocol to courier to the receiving computing system . It can be indirectly indicated that an F room is a time, when the temporary use of the communication carrier network is used to fasten the message from the fast L time; it has been exceeded; and the period of operation is not exceeded after the above-mentioned interruption I Temple has not yet postponed the above-mentioned actions in the Qin Dynasty to the message 30 200425691 4 1. The method described in item 40 of the scope of patent application, wherein the above uses a connectionless communication protocol to The message express delivery to the receiving computing system includes at least the following actions: A express delivery operation expresses the message to the receiving computing system by using a user data message protocol (UDP). 42. The method as described in item 40 of the scope of patent application, wherein the above-mentioned action of expressing the message to the receiving computing system using a connectionless communication protocol includes at least the following: A express action, which uses a wireless application protocol ( WAP) and express the message to the receiving computing system. 43. The method according to item 38 of the scope of patent application, wherein the above-mentioned action of expressing the message to the receiving computing system on the communication carrier network includes at least the following: A express action, which uses a transmission control protocol ( TCP) and express the message to the receiving computing system. 44. The method according to item 38 of the scope of patent application, wherein the above-mentioned action of constructing a message including a data field that can at least indirectly represent a data interruption time includes at least the following: A constructing action, which can construct A message including the due time. 3 1 200425691 45. The method described in item 38 of the scope of patent application, wherein the above-mentioned action of constructing a message including a message that can at least indirectly represent a data block that should be interrupted at least includes the following: A constructing action, which is A message can be constructed that includes a time from which the interruption time should be derived. 46. The method as described in item 38 of the scope of patent application, wherein the above-mentioned constructing an action including a message that can at least indirectly represent a data block that should be interrupted in time includes at least the following: A constructing action, which can construct A message including a data field from which the interruption time should be derived. 4 7. The method according to item 38 of the scope of patent application, further comprising the following: A receiving action, which can receive a response to one of the messages while maintaining the connection. 4 8. —A computer program product applicable to a wireless device, the wireless device is configured to send a message to a receiving computing system on a communication carrier network, and the computer program product is used to implement a A method for forcing an interruption time on the wireless device to prevent possible miscommunication of future information of the wireless device due to a non-association between a previous address and the wireless device. The computer program product includes at least one or more multiple computer-readable media having thereon the following: computer-executable instructions construct, which construct a system for message inquiry means 32 200425691 7 ι dagger α i comprises at least indirectly indicates a corresponding interrupt bit data block of time The response interruption time is a period of time after which a response to the message will not be delivered to a wireless device using a temporary finger address u * a Yin Zhi 疋 address, the temporary designated address is assigned to The wireless device; a computer-executable set-up instruction, which is used to establish a connection to the communication carrier network; a computer-executable express instruction, installed in the field, > It is used to courier the message to the receiving computing system on the communication carrier network. The computer-executable maintenance link refers to Gan # before the order is hardened. It maintains the connection at least from the courier to the receiver. From the time when the secret occultist recognizes the 4 aliens to at least the time that should be interrupted; the computer-executable determination instruction can determine that the time that should be interrupted has been exceeded; and the computer-executable disconnection instruction, It can interrupt the established connection during the period of maintaining the connection, whether or not a response is received, after determining that the interruption time has expired. 49. The computer program product described in item 48 of the scope of patent application, wherein the computer-executable instructions for releasing the established connection are also executed after the action that the judgment should be interrupted has not been extended. 50. The computer program product described in item 48 of the scope of patent application, wherein the computer-executable instructions for express delivery of the message to the receiving computing system on the communication carrier network include at least the following: 33 200425691 computer-executable A courier instruction expresses the message to the receiving computing system using a connectionless communication protocol. 5 1. The computer program product described in item 48 of the scope of patent application, wherein the above-mentioned instructions executable by a computer using a connectionless communication protocol to deliver the message to the receiving computing system include at least the following: A command that uses the User Data Message Protocol (UDP) to courier the message to the receiving computing system. 52. The computer program product described in item 48 of the scope of patent application, wherein the computer-executable instructions for expressing the message to the receiving computing system using a connectionless communication protocol include at least the following: computer-executable express instructions It uses the Wireless Application Protocol (WAP) to deliver the message to the receiving computing system. 5 3. The computer program product described in item 48 of the scope of patent application, wherein the computer-executable instructions for express delivery of the message to the receiving computing system on the communication carrier network include at least the following: computer-executable Express order, which uses the Transmission Control Protocol (TCp) to express the message to the receiving computing system. 54. The computer program product according to item 48 of the scope of patent application, wherein the above-mentioned computer-executable instructions for constructing a computer-executable instruction including a data block that can at least indirectly represent a data interruption time, include at least the following: 200425691 A computer-executable construction instruction for constructing a message including the due time. 55. The computer program product described in Item 48 of the Chinese Patent Application, wherein the above-mentioned computer-executable instructions for building talents & including a message that can at least indirectly represent a data field that should be interrupted, It contains at least the following: a computer-executable construction instruction for constructing a message including a time from which the interruption time should be derived. 56. The computer program product described in item 4 of the scope of the Chinese 4 patent, wherein the computer-executable instructions for constructing-including a message that can at least indirectly represent a data block that should be interrupted in time include at least the following: Computer-executable construction instructions are used for construction-messages, which include a data shelf from which the interruption time should be derived. ,, 7. The computer program product described in the 48th scope of the patent application, in which one or more of the above computer-readable media have the following instructions on the computer. The receipt of a response to one of the messages during the period during which the connection is maintained. The computer program product described in item 48 of the scope of Zhongqing's patent, where the media that can be read by the computer or more is physical media. For example, the computer program product described in item 58 of the scope of patent application, wherein the physical media described in 35 59 200425691 is system memory. 60. The computer program product according to item 58 of the scope of patent application, wherein the physical medium is a persistent memory. 61. —A computer-readable medium having a data structure representing a message thereon, the data structure including at least the following: a content field, which can identify the content of the message; 一臨時性網路位址的識別符,該臨時性網路位址是指 派給一無線裝置;及 一應中斷時間之欄位,其係可指出該無線裝置計劃從 一通訊載波網路中斷從而失去該臨時性網路位址的一時間。 U 36An identifier for a temporary network address, the temporary network address is assigned to a wireless device; and a field for an interruption time, which indicates that the wireless device is planned to be interrupted from a communication carrier network, thereby A time when the temporary network address is lost. U 36
TW092130348A 2002-11-19 2003-10-30 Time-to-disconnect enforcement when communicating with wireless devices that have transient network addresses TWI331467B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/300,271 US7379971B2 (en) 2002-11-19 2002-11-19 Time-to-disconnect enforcement when communicating with wireless devices that have transient network addresses

Publications (2)

Publication Number Publication Date
TW200425691A true TW200425691A (en) 2004-11-16
TWI331467B TWI331467B (en) 2010-10-01

Family

ID=32229867

Family Applications (1)

Application Number Title Priority Date Filing Date
TW092130348A TWI331467B (en) 2002-11-19 2003-10-30 Time-to-disconnect enforcement when communicating with wireless devices that have transient network addresses

Country Status (9)

Country Link
US (1) US7379971B2 (en)
EP (1) EP1422906B1 (en)
JP (1) JP4460264B2 (en)
KR (1) KR101120856B1 (en)
CN (1) CN100581153C (en)
AT (1) ATE321410T1 (en)
DE (1) DE60304100T2 (en)
HK (1) HK1066660A1 (en)
TW (1) TWI331467B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8516054B2 (en) * 2000-12-20 2013-08-20 Aurea Software, Inc. Message handling
US8301800B1 (en) 2002-07-02 2012-10-30 Actional Corporation Message processing for distributed computing environments
US8191078B1 (en) 2005-03-22 2012-05-29 Progress Software Corporation Fault-tolerant messaging system and methods
US8301720B1 (en) 2005-07-18 2012-10-30 Progress Software Corporation Method and system to collect and communicate problem context in XML-based distributed applications
US20070106804A1 (en) * 2005-11-10 2007-05-10 Iona Technologies Inc. Method and system for using message stamps for efficient data exchange
US7710958B2 (en) 2006-01-20 2010-05-04 Iona Technologies Limited Method for recoverable message exchange independent of network protocols
US7672248B2 (en) * 2006-06-13 2010-03-02 Scenera Technologies, Llc Methods, systems, and computer program products for automatically changing network communication configuration information when a communication session is terminated
JP4520432B2 (en) * 2006-06-15 2010-08-04 Okiセミコンダクタ株式会社 VoIP network system for packet communication by multicast and its construction method
US8656350B2 (en) * 2007-02-06 2014-02-18 Software Ag Event-based process configuration
US8276115B2 (en) * 2007-02-06 2012-09-25 Progress Software Corporation Automated construction and deployment of complex event processing applications and business activity monitoring dashboards
GB2447433A (en) * 2007-02-07 2008-09-17 Vodafone Plc Reduce signalling load
KR101502803B1 (en) * 2007-04-24 2015-03-17 삼성전자주식회사 Method for managing wireless network and wireless device thereof
JP5282448B2 (en) * 2008-05-30 2013-09-04 富士通株式会社 Wireless communication system, wireless communication apparatus and disconnection processing method thereof
WO2010054062A2 (en) 2008-11-05 2010-05-14 Savvion Inc. Software with improved view of a business process
DE102009032631A1 (en) * 2009-07-10 2011-01-13 Rohde & Schwarz Gmbh & Co. Kg Priority based communication network and communication method
US20120124142A1 (en) * 2010-11-15 2012-05-17 Robert Kroeger Light-Weight Method for Delivering the Smallest Set of New Messages to a Conversation Cache on an Intermittently Connected Mobile Email Client
US8868644B2 (en) 2010-11-15 2014-10-21 Google Inc. Mechanism for message prefetching in an intermittently connected offline-capable mobile web application

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6168757B1 (en) 1995-11-15 2001-01-02 Alphatech, Inc. Material formulation for galvanizing equipment submerged in molten aluminum and aluminum/zinc melts
KR100640359B1 (en) * 1999-07-07 2006-10-31 삼성전자주식회사 Method for releasing connection of management system in transmission system
US20020045437A1 (en) * 2000-08-18 2002-04-18 Alexander Kesler Tracing a location of a mobile device
US20020136226A1 (en) * 2001-03-26 2002-09-26 Bluesocket, Inc. Methods and systems for enabling seamless roaming of mobile devices among wireless networks
US7043233B2 (en) * 2001-04-27 2006-05-09 Comverse, Inc. Messaging protocol over internet protocol
JP2004533190A (en) * 2001-06-08 2004-10-28 フォースパス インコーポレイテッド Method and system for bidirectionally initiated data communication with a wireless device
KR100415512B1 (en) * 2001-12-27 2004-01-24 삼성전자주식회사 Session Management Method for supporting Mobile Internet Protocol of Foreign Agent
US6993583B2 (en) * 2002-02-28 2006-01-31 International Business Machines Corporation Dynamically sharing a pool of IP addresses

Also Published As

Publication number Publication date
KR101120856B1 (en) 2012-03-15
TWI331467B (en) 2010-10-01
DE60304100T2 (en) 2006-08-17
EP1422906B1 (en) 2006-03-22
ATE321410T1 (en) 2006-04-15
CN100581153C (en) 2010-01-13
JP2004173267A (en) 2004-06-17
EP1422906A1 (en) 2004-05-26
HK1066660A1 (en) 2005-03-24
DE60304100D1 (en) 2006-05-11
CN1509037A (en) 2004-06-30
US7379971B2 (en) 2008-05-27
US20040098487A1 (en) 2004-05-20
JP4460264B2 (en) 2010-05-12
KR20040044344A (en) 2004-05-28

Similar Documents

Publication Publication Date Title
KR101417722B1 (en) Managing notification messages
TW200425691A (en) Time-to-disconnect enforcement when communicating with wireless devices that have transient network addresses
CN110839078B (en) Proxy push
US8924489B2 (en) Message push notification client improvements for multi-user devices
KR101319640B1 (en) System and method for a user interface directed to discovering and publishing presence information on a network
US8805941B2 (en) Occasionally-connected computing interface
JP4945141B2 (en) System and method for applying flexible attributes for execution of asynchronous network requests
US20070043820A1 (en) System and method for obtaining remote instant messages
TW201251384A (en) System and method for two way push notifications
JP2017204271A (en) Service linking method and system among servers to identify users registered using user identification systems different from each other
JP5593359B2 (en) COMMUNICATION CONTROL DEVICE, MESSAGE TRANSFER METHOD, AND MESSAGE TRANSFER PROGRAM
US20120144036A1 (en) Network location based processing of data communication connection requests
WO2012128555A2 (en) Method and system for providing calender services in a universal plug and play home network environment
CN103650417B (en) The method and system of managing voice mail in universal plug and play network environment
WO2020177731A1 (en) Real-time communication method between hosted applications
JP2000285046A (en) Information processor, its processing method and medium
US8886736B2 (en) Method and system for querying, monitoring and controlling a wireless sensor network using instant messaging system
JP2001202307A (en) Network system, terminal equipment and information transmitting method
JP2020188458A (en) Terminal coupling method and system for multimedia communication
KR20210051744A (en) System and method for integrating associated message in messenger service
US11012399B1 (en) Partial message delivery and status notification in an end-to-end secure messaging context
JP4626834B2 (en) Server apparatus and information processing method
US10944834B1 (en) Socket peering
US10594570B1 (en) Managed secure sockets
JP2003219056A (en) Method for controlling connection

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees